Most computer systems today rely on a Userid / password combination to control access and to protect the data that resides on the systems. This means that the strength of the protection mainly relies on the length and complexity of the password that people choose to use. It is easy to select passwords that are easy to remember and are similar to previous password used. Passwords should be easy for individuals to remember but they should also be hard for others to guess.
Here are some best practices when choosing, maintaining, and protecting your passwords:
Explore using two words separated by a number or punctuation, like "Pro%F0otball" or "l|0n&dog"
Take a word and change the case on some of the letters. Then, either insert a letter or punctuation, or replace some letters with numbers or punctuation (but avoid common substitutions like a->4, I->1). Even better, use a combination of insert/replace: (Example: bomber -> b0mBer -> b0m&Ber -> %0m&Ber)
This may be the best option for creating a complex password without having to remember it. Start by choosing an area of the keyboard to use for your password. Next, decide on a pattern for the password. For example, take the upper-left quadrant of the keyboard and create two lines using 2ws3ed3e or, better yet, combine that sequence which shift characters to get 2ws#ED3e. With this method, you don't have to memorize any passwords, you simply have to remember where the pattern starts on a keyboard.
IT Security ensures that an organization's material and software resources are used only for their intended purposes. At ITD, security is a part of everything we do.